UDP is a relatively simple protocol compared with something like TCP for one simple reason – it has none of the fields that ensure reliable delivery of information. With …
Resolving names can often lead to performance issues on busy networks. For instance in most large networks internet access is handled through central proxies, mainly for security reasons. Organisations …
Authentication is one of the most important parts of any computer system, application or network. Without an adequate authentication method a network operating system will quickly become overloaded and …
There is one factor which is crucial when we are considering capacity planning for a proxy server and that is the ‘peak load’. This point will vary greatly between …
On a network both physical and logical addresses play a role in communication. The use of logical addresses allows for the communication between more than one single network …
This is the 2nd article in our series on troubleshooting network performance problems, in it we are going to look at another area which will help this function. Retransmissions …
Over the years I’ve worked in IT, this is probably the most common and frustrating issue I’ve seen in corporate networks. It’s often extremely hard to solve and often …
For many years if you wanted to analyse the data on your network you needed expensive tools and software. However nowadays this isn’t the case, there are now a …
There’s little point setting up some complicated and expensive NIDS (Network Intrusion Detection System) if you don’t analyse the information it provides. One of then most popular and useful …
One of the most difficult questions that has to be answered in implementing anything new in an IT infrastructure is what is the risk. It doesn’t matter if it’s …